Your message dated Mon, 13 Oct 2025 05:06:07 +0000
with message-id <[email protected]>
and subject line Bug#1117853: fixed in poppler 25.03.0-11.1
has caused the Debian Bug report #1117853,
regarding poppler: CVE-2025-52885
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1117853: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117853
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: poppler
Version: 25.03.0-10
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for poppler.

CVE-2025-52885[0]:
| Poppler ia a library for rendering PDF files, and examining or
| modifying their structure. A use-after-free (write) vulnerability
| has been detected in versions Poppler prior to 25.10.0 within the
| StructTreeRoot class. The issue arises from the use of raw pointers
| to elements of a `std::vector`, which can lead to dangling pointers
| when the vector is resized. The vulnerability stems from the way
| that refToParentMap stores references to `std::vector` elements
| using raw pointers. These pointers may become invalid when the
| vector is resized. This vulnerability is a common security problem
| involving the use of raw pointers to `std::vectors`. Internally,
| `std::vector `stores its elements in a dynamically allocated array.
| When the array reaches its capacity and a new element is added, the
| vector reallocates a larger block of memory and moves all the
| existing elements to the new location. At this point if any pointers
| to elements are stored before a resize occurs, they become dangling
| pointers once the reallocation happens. Version 25.10.0 contains a
| patch for the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-52885
    https://www.cve.org/CVERecord?id=CVE-2025-52885
[1] https://securitylab.github.com/advisories/GHSL-2025-042_poppler/
[2] https://gitlab.freedesktop.org/poppler/poppler/-/merge_requests/1884
[3] 
https://gitlab.freedesktop.org/poppler/poppler/-/commit/4ce27cc826bf90cc8dbbd8a8c87bd913cccd7ec0

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: poppler
Source-Version: 25.03.0-11.1
Done: Salvatore Bonaccorso <[email protected]>

We believe that the bug you reported is fixed in the latest version of
poppler, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated poppler package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 12 Oct 2025 20:30:50 +0200
Source: poppler
Architecture: source
Version: 25.03.0-11.1
Distribution: unstable
Urgency: medium
Maintainer: Debian freedesktop.org maintainers 
<[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 1117853
Changes:
 poppler (25.03.0-11.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Check for duplicate entries (CVE-2025-52885) (Closes: #1117853)
Checksums-Sha1:
 730d8f4bf53b372806885a936119321f84bb081a 4113 poppler_25.03.0-11.1.dsc
 966e7738796f59923bd7aff5f4f4d6b3b01b2704 43596 
poppler_25.03.0-11.1.debian.tar.xz
 bc70751352a5000bc3fcfd73c7c9d09e3c676e0b 6622 
poppler_25.03.0-11.1_source.buildinfo
Checksums-Sha256:
 67d16ccf47115e455ee464aebe5b3a232660f707f9d9038702904f0d17f9b02b 4113 
poppler_25.03.0-11.1.dsc
 4970710dee3b893251e8be5bcdf3ab3128936ea02d899f1470d47b95c65462d7 43596 
poppler_25.03.0-11.1.debian.tar.xz
 fa5d860811294aa368758ad2a677d669a172d27585da5135b8e28f4194e19af5 6622 
poppler_25.03.0-11.1_source.buildinfo
Files:
 9a77577a772755388041c41f35423905 4113 devel optional poppler_25.03.0-11.1.dsc
 b772bfd7b6924cef0ce9ea14983a0ef2 43596 devel optional 
poppler_25.03.0-11.1.debian.tar.xz
 25b5027dea4a9bf8dbf22ba2c3f77374 6622 devel optional 
poppler_25.03.0-11.1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=l0Gk
-----END PGP SIGNATURE-----

Attachment: pgpboRWqYoAXP.pgp
Description: PGP signature


--- End Message ---

Reply via email to